Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y....

24
411 Compilation of References Abdel-Badeeh, M. S., & Rania, A. (2005). A case based expert system for supporting diagnosis of heart diseases, AIML Journal, 5(1). Abdullah, A., Ramly, M., & Derhman. (2008). Perfor- mance comparison study of routing protocols for mobile grid environment. IJCSNS International Journal of Com- puter science and Network security, 8(2). Abend, K., Harley, T. J., & Kanal, L. N. (1965). Clas- sification of binary random patterns. IEEE Transactions on Information Theory, 11, 538–544. doi:10.1109/ TIT.1965.1053827. Ablameiko, S. V., & Lagunovskiy, D. M. (2000). Image processing: Technology, methods, application. Amalphea Publishing. Adinoyi, A., & Yanikomeroglu, H. (2007). Cooperative relaying in multi-antenna fixed relay networks. IEEE Communications Letters, 6(2), 533–544. Advanced Encryption Standard (AES). (2001). National institute for standards and technology. Gaithersburg, MD: AES. Aguiar, A. C., Hoene, C., Klaue, J., Karl, H., Wolisz, A., & Miesmer, H. (2003). Channel-aware schedulers for voip and MPEG-4 based on channel prediction. Ahn, S., & Abt, R. C. (2006). Productivity measurement with improved index numbers: Application to the saw- mills and planning mills industry of the US: 1947–2000. Forest Policy and Economics, 8, 323–335. doi:10.1016/j. forpol.2005.02.006. Ajayi, O. O., Fagbenle, R. O., Katende, J., & Okeniyi, J. O. (2011). Availability of wind energy resource potential for power generation at Jos, Nigeria. Frontiers of Energy. Ajayi, O. O., Fagbenle, R. O., Katende, J., & Okeniyi, J. O. (2013b). Availability of wind energy resource potential for power generation at Jos, Nigeria. Frontier of Energy. Ajayi, O. O., Fagbenle, R. O., Katende, J., Okeniyi, J. O., & Omotosho, O. A. (2013a). Wind energy potential for power generation of a local site in Gusau, Nigeria. International Journal of Energy for a Clean Environment. Ajayi, O. O., Fagbenle, R. O., & Katende, J. (2011). Wind profile characteristic and econometrics analysis of wind power generation of a site in Sokoto State, Nigeria. Energy Science and Technology, 1(2), 54–66. Akasi, A. (1981). Recovering of Gaussian images with the help of two-dimension maximal a posteriori estima- tion. Journal Densi Tsusin Gakkai Rombusini, A-64(11), 908–915. Akl, R., Tummala, D., & Li, X. (2006). Indoor propa- gation modeling at 2.4 GHz for IEEE 802.11networks. Paper presented at the 6th IASTED International Multi- Conference on Wireless and Optical Communications. Banff, Canada. Akpinar, E. K., & Akpinar, S. (2005a). A statistical analysis of wind speed data used in installation of wind energy conversion systems. Energy Conversion and Manage- ment, 46, 515–532. doi:10.1016/j.enconman.2004.05.002. Akpinar, E. K., & Akpinar, S. (2005b). An assessment on seasonal analysis of wind energy characteristics and wind turbine characteristics. Energy Conversion and Management, 46, 1848–1867. doi:10.1016/j.encon- man.2004.08.012.

Transcript of Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y....

Page 1: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

411

Compilation of References

Abdel-Badeeh, M. S., & Rania, A. (2005). A case based expert system for supporting diagnosis of heart diseases, AIML Journal, 5(1).

Abdullah, A., Ramly, M., & Derhman. (2008). Perfor-mance comparison study of routing protocols for mobile grid environment. IJCSNS International Journal of Com-puter science and Network security, 8(2).

Abend, K., Harley, T. J., & Kanal, L. N. (1965). Clas-sification of binary random patterns. IEEE Transactions on Information Theory, 11, 538–544. doi:10.1109/TIT.1965.1053827.

Ablameiko, S. V., & Lagunovskiy, D. M. (2000). Image processing: Technology, methods, application. Amalphea Publishing.

Adinoyi, A., & Yanikomeroglu, H. (2007). Cooperative relaying in multi-antenna fixed relay networks. IEEE Communications Letters, 6(2), 533–544.

Advanced Encryption Standard (AES). (2001). National institute for standards and technology. Gaithersburg, MD: AES.

Aguiar, A. C., Hoene, C., Klaue, J., Karl, H., Wolisz, A., & Miesmer, H. (2003). Channel-aware schedulers for voip and MPEG-4 based on channel prediction.

Ahn, S., & Abt, R. C. (2006). Productivity measurement with improved index numbers: Application to the saw-mills and planning mills industry of the US: 1947–2000. Forest Policy and Economics, 8, 323–335. doi:10.1016/j.forpol.2005.02.006.

Ajayi, O. O., Fagbenle, R. O., Katende, J., & Okeniyi, J. O. (2011). Availability of wind energy resource potential for power generation at Jos, Nigeria. Frontiers of Energy.

Ajayi, O. O., Fagbenle, R. O., Katende, J., & Okeniyi, J. O. (2013b). Availability of wind energy resource potential for power generation at Jos, Nigeria. Frontier of Energy.

Ajayi, O. O., Fagbenle, R. O., Katende, J., Okeniyi, J. O., & Omotosho, O. A. (2013a). Wind energy potential for power generation of a local site in Gusau, Nigeria. International Journal of Energy for a Clean Environment.

Ajayi, O. O., Fagbenle, R. O., & Katende, J. (2011). Wind profile characteristic and econometrics analysis of wind power generation of a site in Sokoto State, Nigeria. Energy Science and Technology, 1(2), 54–66.

Akasi, A. (1981). Recovering of Gaussian images with the help of two-dimension maximal a posteriori estima-tion. Journal Densi Tsusin Gakkai Rombusini, A-64(11), 908–915.

Akl, R., Tummala, D., & Li, X. (2006). Indoor propa-gation modeling at 2.4 GHz for IEEE 802.11networks. Paper presented at the 6th IASTED International Multi-Conference on Wireless and Optical Communications. Banff, Canada.

Akpinar, E. K., & Akpinar, S. (2005a). A statistical analysis of wind speed data used in installation of wind energy conversion systems. Energy Conversion and Manage-ment, 46, 515–532. doi:10.1016/j.enconman.2004.05.002.

Akpinar, E. K., & Akpinar, S. (2005b). An assessment on seasonal analysis of wind energy characteristics and wind turbine characteristics. Energy Conversion and Management, 46, 1848–1867. doi:10.1016/j.encon-man.2004.08.012.

Page 2: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

412

Akpinar, S., & Akpinar, E. K. (2007). Wind energy analysis based on maximum entropy principle (MEP)-type distri-bution function. Energy Conversion and Management, 48, 1140–1149. doi:10.1016/j.enconman.2006.10.004.

Akyildiz, I., Altunbasak, Y., Fekri, F., & Sivakumar, R. (2004). AdaptNet: An adaptive protocol suite for the next generation wireless internet. IEEE Communications Mag-azine, 42, 128–136. doi:10.1109/MCOM.2004.1273784.

Alamouti. (1998). A simple transmit diversity technique for wireless communications. IEEE Journal on Selected Areas in Communications.

Alberto, L., & Widjaja, I. (2004). Communications networks: Fundamental concepts and key architectures. New York: McGraw Hill.

Alli, O. A., Ogunwolu, L., & Oke, O. (2009). Maintenance Productivity Measurement: Case Study of a Manufacturing Company, Advanced Materials Research, 62-64, 565-570. doi:10.4028/www.scientifi.net/AMR.62-64.565.

Al-Muthairi, N. F., & Zbiri, M. (2004). Sliding mode control of a magnetic levitation system. Mathemati-cal Problems in Engineering, 2, 93–107. doi:10.1155/S1024123X04310033.

Alouini, M.-S., & Simon, M. K. (2002). Dual diversity over correlated log-normal fading channels. IEEE Transactions on Communications, 50(12), 1946–1959. doi:10.1109/TCOMM.2002.806552.

Alsyouf, I. (2007). The role of maintenance in improv-ing companies’ productivity and profitability. Interna-tional Journal of Production Economics, 105, 70–78. doi:10.1016/j.ijpe.2004.06.057.

Amarasuriya, G., Ardakani, M., & Tellambura, C. (2010). Output-threshold multiple-relay-selection scheme for cooperative wireless networks. IEEE Transactions on Vehicular Technology, 59(6), 3091–3097. doi:10.1109/TVT.2010.2048767.

Amiantov, I. N. (1971). Selected issues of the statisti-cal communication theory. Moscow, Russia: Sovetskoe Radio Publishing.

Anantharam, V. (1993). An approach to the design of high-speed networks for bursty traffic. In Proceedings of the 32nd IEEE Conference on Decision and Control. San Antonio, TX: IEEE.

Anisur, R. Islam, & Talevski. (2009). Performance mea-surement of various routing protocols in ad hoc network. In Proceeding of the International Multi-Conference of Engineers and Computer Scientists. Hong Kong: MECS.

ANSI. (1996). Digital transport of video teleconferenc-ing/Video telephony signals. ANSI T1.801.01/02-1996.

Anurag, K., Manjunath, D., & Kuri, J. (2004). Communica-tion networking: An analytical approach. San Francisco, CA: Morgan Kaufmann Publishers.

Apple. (n.d.). QuickTime player software. Retrieved from http://www.apple.com

Armstrong, H. (2009). Advanced IT education for the vision impaired via e-learning. Journal of Information Technology Education, 8, 244–256.

Aroyo, L., & Dicheva, D. (2004). The new challenges for e-learning: The educational semantic web. Journal of Educational Technology & Society, 7(4), 59–69.

Arpaci. (2001). Congestion avoidance in TCP/IP net-works. Retrieved from http://www.csc.gatech.edu/~mutlu/arpaci_thesis.pdf

Arun-Kumar B. R., Lokanatha, C., Reddy, Prakash, S., & Hiremath. (2008). Performance comparison of wire-less mobile ad hoc network routing protocols. IJCSNS International Journal of Computer Science and Network Security, 8(6).

Atayero, A. A. (2000). Estimation of the quality of digi-tally transmitted analogue signals over corporate VSAT networks. (Unpublished Doctoral Thesis). Moscow.

Atayero, A. A., Sheluhin, O. I., & Ivanov, I. (2011). Ef-fect of wideband wireless access systems interference robustness on the quality of video streaming. Proceedings of the World Congress on Engineering and Computer Science, 2, 848-854.

Page 3: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

413

Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless wideband access networks. In Proceed-ings of IAENG Transactions on Engineering Technologies (pp. 15-28). Springer.

Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2012). Modeling, simulation, and analysis of video streaming errors in wireless wideband access networks. IAENG Transactions on Engineering Technologies, 170, 15–28. doi:10.1007/978-94-007-4786-9_2.

Atayero, A. A., Sheluhin, O. I., Ivanov, Y. A., & Alatishe, A. S. (2011). Estimation of the visual quality of video streaming under desynchronization conditions. Inter-national Journal of Advanced Computer Science and Applications, 2(12), 1–11.

Aune, F. (2004). Cross-layer design tutorial. Trond-heim, Norway: Norwegian University of Science and Technology.

Auwera, L. V., Meyer, F., & Malet, L. M. (1980). The use of the Weibull three-parameter model for estimating mean wind power densities. Journal of Applied Meteorology, 19, 819–825. doi:10.1175/1520-0450(1980)019<0819:TUOTWT>2.0.CO;2.

Azeta, A. A., Ayo, C. K., Atayero, A. A., & Ikhu-Omoreg-be, N. A. (2008c). Development of a telephone-based e-learning portal. In Proceedings of the 1st International Conference on Mobile Computing, Wireless Communica-tion, E-Health, M-Health and TeleMedicine (FICMWiC-omTelHealth’08), (pp. 141-149). Ogbomosho, Nigeria: FICMWiComTelHealth.

Azeta, A. A., Ayo, C. K., Atayero, A. A., & Ikhu-Omoreg-be, N. A. (2009c). A case-based reasoning approach for speech-enabled e-learning system. In Proceedings of 2nd IEEE International Conference on Adaptive Science & Technology (ICAST). Accra, Ghana: IEEE. Retrieved from http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=5375737

Azeta, A. A., Ayo, C. K., Atayero, A. A., & Ikhu-Omoreg-be, N. A. (2009b). Application of voiceXML in e-learning systems. In Cases on Successful E-Learning Practices in the Developed and Developing World: Methods for the Global Information Economy. Hershey, PA: IGI Global. doi:10.4018/978-1-60566-942-7.ch007.

Bacry, E., Muzy, J. F., & Arneodo, A. (1993). Singular-ity spectrum of fractal signals: Exact results. Journal of Statistical Physics, 70(3/4), 635–674. doi:10.1007/BF01053588.

Baguda, Y., Fisal, N., Syed, S., Yusof, S., Mohd, S. A., Mohd, A., & Zulkarmawan, A. (2008). Mobile streaming of H.264 video over Gilbert-Elliotts channel. PWASET, 36.

Bakalis & Bello. (2010). Performance evaluation of CBR and TCP traffic models on MANET using DSR routing protocol. In Proceedings of IEEE 2010 International Conference on Communications and Mobile Computing. Shenzhen, China: IEEE.

Balci, O. (1997). Verification, validation and accreditation of simulation models. In Proceedings of the 29th Confer-ence Winter, Simulation, (pp. 47–52). IEEE.

Barrie, W., & Chiasson, J. (1996). Linear and nonlinear state-space controllers for magnetic levitation. Interna-tional Journal of Systems Science, 27(11), 1153–1163. doi:10.1080/00207729608929322.

Barros, J., & Rodrigues, M. R. D. (2006). Secrecy ca-pacity of wireless channels. Paper presented at the IEEE International Symposium on Information Theory (ISIT 2006). Seattle, WA.

Beaulieu, N. C., & Hu, J. (2006). A closed-form expres-sion for the outage probability of decode-and-forward relaying in dissimilar Rayleigh fading channels. IEEE Communications Letters, 10(12), 813–815. doi:10.1109/LCOMM.2006.061048.

Bejerano, Y., Breithart, Y., Garofalakis, M., & Rastogi, R. (2003). Physical topology discovery for large multi-subnet networks. IEEE Transactions on Networking, 3(6), 342–352.

Bennett, C. (1992). Quantum cryptography using any two non-orthogonal states. Physical Review Letters, 68, 3121–3124. doi:10.1103/PhysRevLett.68.3121 PMID:10045619.

Berchtold. (1999). The double chain Markov model (Technical Report Nº 348). Seattle, WA: University of Washington, Department of Statistics.

Page 4: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

417

Dohler, M., & Li, Y. (2010). Cooperative communication: Hardware, channel and PHY. New York: John Wiley & Sons. doi:10.1002/9780470740071.

Donegan, M. (2000). BECTA voice recognition project re-port. In Proceedings of BECTA. Retrieved from http://www.becta.org.uk/teachers/teachers.cfm?section=2&id=2142

Dragan, Y. P. (1993). Status and development prospects of probabilistic models of random signals and fields. Kharkiv, Ukraine: HIRE Publishing.

Du Bois, & Reymond, P. (1875). Verch einer classification der willrurlichen functionen reeler argumente nach ihren aenderungen inden beinsten intervallen. Journal Furder Reine und Angewandte Mathematiques, 79, 21–37.

Duong, T. Q., Bao, V. N. Q., & Zepernick, H. J. (2009). On the performance of selective decode-and-forward relay networks over Nakagami-m fading channels. IEEE Communications Letters, 13(3), 172–174. doi:10.1109/LCOMM.2009.081858.

Dusek, M., Lutkenhaus, N., & Hendrych, M. (2006). Quantum cryptography. Progress in Optics, 49, 381–454. doi:10.1016/S0079-6638(06)49005-3.

Dvorkovich, A. V. (2005). Efficient encoding video in the new standard H.264/AVC. In Proceedings of NIIR. NIIR.

Ebert, J.-P., Willig, A. A., & Gilbert-Elliot. (1999). Bit error model and the efficient use in packet level simulation. In Proceedings of TKN Technical Reports. Berlin: TKN.

Elfeki, A. A., & Dekking, M. (2001). Markov chain model for subsurface characterization: Theory and applications. Mathematical Geology, 33, 569–589. doi:10.1023/A:1011044812133.

Elkashlany, M., Yeohyz, P. L., Sungy, C. K., & Collings, I. B. (2010). Distributed multi-antenna relaying in nonre-generative cooperative networks. In Proceedings of IEEE 21st International Symposium on Personal Indoor and Mobile Radio Communications. IEEE Press.

Elliot, E. O. (1963). Estimates of error rates for codes on burst-noise channels. The Bell System Technical Journal, 42, 1977–1997.

Emad, A. (2008). Basic principles of OFDM system. Paper presented at the Electrical Engineering and Electronics Dept, University of Liverpool. Liverpool, UK.

Ermalai, I. And one, D., & Vasiu, R. (2009). Study cases on e-learning technologies used by universities in romania and worldwide. WSEAS Transactions on Communications, 8(8), 785–794. Retrieved from http://www.wseas.us/E-library/transactions/communications/2009/29-640.pdf

Ersoy, C., & Panwar, S. (1993). Topological design of interconnected LAN/MAN networks. IEEE Journal on Selected Areas in Communications, 11(8), 1172–1182. doi:10.1109/49.245906.

Eti, M. C., Ogaji, S. O. T., & Probert, S. D. (2004). Implementing total productive maintenance in Nigerian manufacturing industries. Applied Energy, 79, 385–401. doi:10.1016/j.apenergy.2004.01.007.

ETSI TR 102 493. (n.d.). Guidelines for the use of video quality algorithms for mobile applications. ETSI.

ETSI TR 136 942. (2009). LTE; evolved universal terres-trial radio access (E-UTRA); radio frequency (RF) system scenarios. Technical Report Version 8.2.0. Retrieved from http://www.3gpp.org

ETSI TS 136 201. (2011). LTE; evolved universal ter-restrial radio access (E-UTRA); LTE physical layer; general description. Technical Specification Version 10.0.0. Retrieved from http://www.3gpp.org

ETSI TS 136 211. (2011). LTE; evolved universal ter-restrial radio access (E-UTRA); physical channels and modulation. Technical Specification Version 10.2.0. Retrieved from http://www.3gpp.org

ETSI TS 136 300. (2011). LTE; evolved universal ter-restrial radio access (E-UTRA) and evolved universal terrestrial radio access network (E-UTRAN); overall description; stage 2. Technical Specification Version 10.4.0. Retrieved from http://www.3gpp.org

Fadare, D. A. (2009). Modeling of solar energy poten-tial in Nigeria using artificial neural network model. Applied Energy, 86(9), 1410–1422. doi:10.1016/j.apen-ergy.2008.12.005.

Fadare, D. A. A. (2008). Statistical analysis of wind energy potential in Ibadan, Nigeria, based on Weibull distribution function. The Pacific Journal of Science and Technology, 9(1), 110–119.

Page 5: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

416

Chrysikos, T., Georgopoulos, G., Birkos, K., & Kotsopou-los, S. (2009). Wireless channel characterization: On the validation issues of indoor RF models at 2.4 GHz. Paper presented at the Panhellenic Conference on Electronics and Telecommunications (PACET). Patras, Greece.

Comer, D. (2004). Computer networks and intranets with internet applications. Englewood Cliffs, NJ: Pearson Prentice Hall.

Cornaglia, B., & Spini, M. (1996). New statistical model for burst error distribution. In European Transactions on Telecommunications. Torino, Italy: John Wiley & Sons. doi:10.1002/ett.4460070308.

Costa, P., Netto, J., & Pereira, C. (2004). Analysis of traf-fic differentiation on switched ethernet. In Proceedings of the International Workshop on Real-Time Networks. Retrieved August 20, 2009 from http://www.ieeta.pt/lse/rtn2004/preprints

Cranefield, S., Hart, L., Dutra, M., Baclawski, K., Kokar, M., & Smith, J. (2002). UML for ontology development. The Knowledge Engineering Review, (17): 61–64.

Cruz, R. (1991). A calculus for network delay, part 1: Network elements in isolation. IEEE Transactions on In-formation Theory, 37(1), 114–131. doi:10.1109/18.61109.

Cuomo, K. M., & Oppenheim, A. V. (1993). Circuit implementation of synchronized chaos with applications to communications. Physical Review Letters, 71(1), 65–68. doi:10.1103/PhysRevLett.71.65 PMID:10054374.

Dagion, D., & Mercero, R. (1988). Digital processing of multi-dimensional signals. Moscow: MIR Publishing.

Dahlman, Parkvall, & Skold. (2011). 4G LTE/LTE-advanced for Mobile Broadband. London: Elsevier.

Dai, M., & Loguinov, D. (2005). Analysis and modeling of MPEG-4 and H.264 multi-layer video traffic. In Pro-ceedings of IEEE INFOCOM. Miami, FL: IEEE.

Dang, T. D. (2002). New results in multifractal traffic analysis and modeling. (Ph.D. Dissertation). Budapest, Hungary.

Deb, S., Jaiswal, S., & Nagaraj, K. (2008). Real-time video multicast in WiMAX networks. In Proceedings of IEEE INFOCOM. IEEE.

Debbah, M. (2002). Short introduction to OFDM. Wash-ington, DC: IEEE Press.

Dech, G. (1971). Manual to the practical application of the Laplace transformation and z-transformation. Moscow: Nauka Publishing.

DeCoste, D. (1991). Dynamic across-time measurement interpretation. Artificial Intelligence, 51, 273–341. doi:10.1016/0004-3702(91)90113-X.

Dedieu, H., Kennedy, M. P., & Hasler, M. (1993). Chaos shift keying: modulation and demodulation of a chaotic carrier using self-synchronizing Chua’s circuits. IEEE Transactions on Circuits and Systems II, 40, 634–642. doi:10.1109/82.246164.

Demuth & De Jesus, O. (2002). An introduction to the use of neural networks in control systems. International Jour-nal of Robust and Nonlinear Control, 12(11), 959–985. doi:10.1002/rnc.727.

Derin, H., & Kelly, P. (1989). Random processes of Mar-kov type with discrete arguments. TIEEE, 77(10), 42–71.

Devedzic, V. (2004). Education and the semantic web. International Journal of Artificial Intelligence in Educa-tion, 14, 9–65.

Di, R. M., Graziosi, F., & Santucci, F. (2008). Performance of cooperative multi-hop wireless systems over log-normal fading channels. In Proceedings of IEEE Global Telecom-munications Conference (GLOBECOM 08). IEEE.

Dicheva, D., Sosnovsky, S., Gavrilova, T., & Brusi-lovsky, P. (2005). Ontological web portal for educational ontologies. In Proceedings of International Workshop on Applications of Semantic Web Technologies for E-Learning (SW-EL). Amsterdam: SW-EL. Retrieved from http://www.win.tue.nl/SW-EL/2005/swel05-aied05/proceedings/4-Dicheva-final-full.pdf

Divitini, M., Haugalokken, O., & Morken, E. M. (2005). Blog to support learning in the field: Lessons learned from a fiasco. In Proceedings of the Fifth IEEE International Conference on Advanced Learning Technologies (ICALT ’05), (pp. 219- 221). IEEE.

Dixon, A. R., Yuan, Z. L., Dynes, J. F., Sharpe, A. W., & Shields, A. J. (2010). Continuous operation of high bit rate quantum key distribution. Applied Physics Letters. doi:10.1063/1.3385293.

Dmitriev, A. S., & Panas, A. I. (2002). Dynamic chaos: New information carriers for communication systems. Moscow, Russia: Fizmatlit.

Page 6: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

415

Bykov, V. V. (1971). Digital modeling in the statistical radio engineering. Moscow: Sovetskoe Radio Publishing.

Camel, D. E. (2003). Principles, protocols, and structure. Networks TCP/IP.

Carta, J. A., Ramı’rez, P., & Velázquez, S. (2009). A review of wind speed probability distributions used in wind energy analysis: Case studies in the Canary Islands. Renewable & Sustainable Energy Reviews, 13, 933–955. doi:10.1016/j.rser.2008.05.005.

Center for KvanteInformatik. (n.d.). Implementation of the B92 QKD protocol. Retrieved from www.cki.au.dk/experiment/qrypto/doc/QuCrypt/b92prot.html

Chan, F. T. S., Lau, H. C. W., Ip, R. W. L., Chan, H. K., & Kong, S. (2005). Implementation of total productive main-tenance: A case study. International Journal of Production Economics, 95, 71–94. doi:10.1016/j.ijpe.2003.10.021.

Chang, T. J., & Tu, Y. L. (2007). Evaluation of monthly capacity factor of WECS using chronological and probabilistic wind speed data: A case study of Taiwan. Renewable Energy, 32, 1999–2010. doi:10.1016/j.re-nene.2006.10.010.

Chan, H. C. B., & Leung, V. C. M. (1998). A dynamic reservation protocol for integrating CBR/VBR/ABR traffic over IEEE 802.14 HFC networks. Vancouver, Canada: The University of British Columbia. doi:10.1109/GLO-COM.1998.776644.

Channel Models for Fixed Wireless Applications. (n.d.). IEEE 802.16 broadband wireless access. Working Group IEEE 802.16.3c-01/29r4.

Chellappa, R. (1985). Two-dimensional discrete Gaussian Markov random fields for image processing. In Progress in Pattern Recognition 2. Amsterdam: Elsevier Science Publishers BV.

Chellappa, R., & Kashyap, R. L. (1982). Digital image restoration using spatial interaction models. IEEE Trans-actions on Acoustics, Speech, and Signal Processing, 30, 461–472. doi:10.1109/TASSP.1982.1163911.

Cheng, Cheng, & Lee. (2002). Neuro-fuzzy and genetic algorithm in multiple response optimization. International Journal of Computers & Mathematics with Applications, 44, 1503–1514. doi:10.1016/S0898-1221(02)00274-2.

Cheung, K. W., Sau, J. H. M., & Murch, R. D. (1998). A new empirical model for indoor propagation predic-tion. IEEE Transactions on Vehicular Technology, 47(3), 996–1001. doi:10.1109/25.704854.

Chin, C. C., Hock, G. T., & Veerappan, C. M. (2006). VoiceXML as solution for improving web accessibility and manipulation for e-education. In Proceedings of School of Computing and IT, INTI College. Malaysia: INTI. Retrieved from http://intisj.edu.my/INTISJ/InfoFor/StaffResearch/10.pdf

Christensen, K., Hass, L., Noel, F., & Stole, N. (1995). Local area networks: Evolving from shared to switched access. IBM Systems Journal, 347–374. doi:10.1147/sj.343.0347.

Chrysikos, T., & Kotsopoulos, S. (2009). Impact of channel-dependent variation of path loss exponent on wireless information-theoretic security. Paper presented at the Wireless Telecommunications Symposium (WTS 2009). Prague, Czech Republic.

Chrysikos, T., Georgopoulos, G., & Kotsopoulos, S. (2009a). Site-specific validation of ITU indoor path loss model at 2.4 GHz. Paper presented at the IEEE Work-shop on Advanced Experimental Activities on Wireless Networks and Systems. Kos Island, Greece.

Chrysikos, T., Georgopoulos, G., & Kotsopoulos, S. (2009b). Empirical calculation of shadowing deviation for complex indoor propagation topologies at 2.4 GHz. Paper presented at the International Conference on Ultra Modern Telecommunications (ICUMT 2009). St. Petersburg, Russia.

Chrysikos, T., Georgopoulos, G., & Kotsopoulos, S. (2010). Impact of shadowing on wireless channel char-acterization for a public indoor commercial topology at 2.4 GHz. Paper presented at the International Congress on Ultra Modern Telecommunications (ICUMT 2010). Moscow, Russia.

Chrysikos, T., Georgopoulos, G., & Kotsopoulos, S. (2011). Wireless channel characterization for a home indoor propagation topology at 2.4 GHz. Paper presented at the Wireless Telecommunications Symposium (WTS 2011). New York, NY.

Page 7: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

414

Berts, J., & Persson, A. (1998). Objective and subjective quality assessment of compressed digital video sequences. (Master’s thesis). Chalmers University of Technology, Göteborg, Sweden.

Bertsekas, D., & Gallager, R. (1992). Data networks. Englewood Cliffs, NJ: Prentice Hall.

Besag, J. E. (1974). Spatial interaction and statistical analysis of lattice systems. Journal of the Royal Statistical Society. Series B. Methodological, 36, 192–236.

Biham, E., Boyer, M., Boykin, P. O., Mor, T., & Roy-chowdhury, V. A. (n.d.). Proof of the seurity of quantum key distribution. Retrieved from http://arxiv.org/abs/quant-ph/9912053v1

Blatses, A., Shin, A. H., & Lippman, A. (2006). A simple cooperative diversity method based on network path selec-tion. IEEE Journal on Selected Areas in Communications, 24(3), 659–672. doi:10.1109/JSAC.2005.862417.

Bloch, M., Barros, J., Rodrigues, M. R. D., & McLaugh-lin, S. W. (2008). Wireless information-theoretic secu-rity. IEEE Transactions on Information Theory, 54(6), 2515–2534. doi:10.1109/TIT.2008.921908.

Bobbie, P. O., Fordjour, I., Aboagye, D. O., Dzidonu, C., Darkwa, O., & Nyantakyi, K. (2008). Technology enablers for collaborative virtual education. In Proceedings of 3rd International Conference on ICT for Development, Education and Training AICC. Accra, Ghana: AICC.

Boldia, I., & Nasar, S. A. (1986). Electric machines dynamics. New York: Macmillan.

Bolot, J. (1993). Characterizing end-to-end packet delay and loss in the internet. Journal of High-Speed Networks, 2(3), 305–323.

Bolotov, V. N., & Tkach, Y. V. (2006). Generating of signals with a fractal spectra. Journal of Technical Phys-ics, 76(4), 91–98.

Bolu, C. A. (2011). Curve fitting breakdown distribu-tion of a 4-high aluminium rolling mills, Ota, Nigeria using MATLAB. (Unpublished Report).Department of Mechanical Engineering, Covenant University, Lagos, Nigeria.

Bondur, V. G. (2003). Modeling of multi-spectral airspace images of the dynamic fields of brightness (in Russian). Investigation of Earth from Space, (2), 3-17.

Bouwmeester, D., Ekert, A. K., & Zeilinger, A. (2000). The physics of quantum information: Quantum cryptog-raphy, quantum teleportation, and quantum computation. Berlin: Springer.

Boyd, H. S., & Vandenberghe, L. (2004). Convex optimi-zation. New York: Cambridge University Press.

Bozhokin, S. V., & Parshin, D. A. (2001). Fractals and multifractals [Regularnaya i haoticheskaya dinamika]. Izhevsk, Russia: NIC.

Braden. (1998). Recommendations on queue management and congestion avoidance in the internet. RFC 2039.

Brassard, G. (2007). Modern cryptology: A tutorial. New York: Springer-Verlag.

Brassard, G., & Salvail, L. (1993). Secret-key reconcili-ation by public discussion: Advances in cryptology. In Proceedings of Eurocrypt ’93. Lofthus, Norway: IEEE Press.

Brichet, F., Roberts, J., Simonian, A., & Veitch, D. (1996). Heavy traffic analysis of a storage model with long range dependent on/off sources. Queueing Systems, 23, 197–215. doi:10.1007/BF01206557.

Broch, Maltz, Johnson, Hu, & Jetcheva. (1998). A perfor-mance comparison of multi-hop wireless ad hoc network routing protocols. Pittsburgh, PA: Computer Science Department, Carnegie Mellon University.

Bures, I. M., & Jelinek, I. (2004). Description of the adaptive web system for e-learning. In Proceedings of IADIS International Conference E-Society 2004, (Vol. 2). IADIS. Retrieved from http://www.iadis.net/dl/fi-nal_uploads/200402C042.pdf

Burton, T., Sharpe, D., Jenkins, N., & Bossanyi, E. (2001). Wind energy handbook. Hoboken, NJ: Wiley. doi:10.1002/0470846062.

Butorin, E. L. (2004). Nonlinear filtering devices for digital half-tone images of Markovian type. (Unpublished Doctoral Thesis). Moscow Power Engineering Institute, Moscow, Russia.

Bychkov, S. I., & Rumiantsev, K. E. (2000). Search and detection of optical signals. Moscow, Russia: Radio and Connection Publisher.

Page 8: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

418

Fagbenle, R. O., Katenje, J., Ajayi, O. O., & Okeniyi, J. O. (2011). Assessment of wind energy potential of two sites in North-East, Nigeria. Renewable Energy, 36, 1277–1283. doi:10.1016/j.renene.2010.10.003.

Falaki, S., & Sorensen, S. (1992). Traffic measurements on a local area computer network. Butterworth Heinemann Computer Communications Journal, 15(3), 192–197. doi:10.1016/0140-3664(92)90080-X.

Falconer, K. J. (1997). Techniques in fractal geometry. New York: John Wiley & Sons.

Fano, R. (1965). Statistical theory of communication. In Transmission of Information. Moscow: MIR Publishing.

Fantacci, R., & Scardi, M. (n.d.). Perfomance evaluation of preemptive polling schemes and ARQ techniques for indoor wireless networks. IEEE Transaction on Vehicular technology, 45(2), 248-257.

Farinazzo, V., Salvador, M., & Luiz, A. S. Kawamoto, & de Oliveira Neto, J. S. (2010). An empirical approach for the evaluation of voice user interfaces. User Interfaces. Retrieved from www.intechopen.com/download/pdf/pdfs_id/10804

Fawcett, T. (2003). ROC graphs: Notes and practical considerations for data mining researchers. Palo Alto, CA: HP Labs.

Feldmann, A., Gilbert, A. C., & Willinger, W. (1998). Data networks as cascades: Investigating the multifrac-tal nature of internet WAN traffic. ACM SIGCOMM Computer Communication Review, 28(4), 42–55. doi:10.1145/285243.285256.

Feng, W.-C. (1997). Buffering techniques for delivery of compressed video in video-on-demand systems. Norwell, MA: Kluwer Academic Publisher.

Floyd & Fall. (1999). Promoting the use of end-to-end congestion control in the internet. ACM/IEEE Transac-tions on Networking, 7(4), 458–473.

Floyd. (1991). Connections with multiple congested gate-ways in packet-switched networks part 1: One-way traffic. ACM Computer Communication Review, 21(5), 30–47.

Forouzan, B. (2008). Data communications and network-ing. New Delhi: Tata McGraw-Hill.

Fowler, H., & Leland, W. (1991). Local area network traffic characteristics, with implications for broadband network congestion management. IEEE Journal on Selected Areas in Communications, 9(7), 1139–1149. doi:10.1109/49.103559.

Freepatentonline.com. (n.d.). Physical layer switch system for ethernet local area communication system. US Patent No. 5889776. Retrieved November 10, 2008 from http://www.freepatentsonline.com/5889776

Frigg, R., & Hartmann, S. (2009). Models in science. In Zalta, E. N. (Ed.), The Stanford Encyclopedia of Philoso-phy. Palo Alto, CA: Metaphysics Research Lab, Center for the Study of Language and Information, Stanford University.

Furman, Y. A. (2003). Introduction to contour analysis and its application to signal and image processing. Moscow: FIZMATLIT Publishing.

Gallivan, P., Hong, Q., Jordan, L., Li, E., Mathew, G., & Mulyani, Y. … Tappert, C. (2002). VoiceXML absentee system. In Proceedings of MASPLAS’02: The Mid-Atlantic Student Workshop on Programming Languages and Systems. Retrieved from http://csis.pace.edu/csis/masplas/p10.pdf

Gallo, A., & Wilder, R. (1981). Performance measure-ment of data communication systems with emphasis on open system interconnections. In Proceedings 8th IEEE Annual Symposium on Computer Architecture, (pp. 149-161). Minneapolis, MN: IEEE.

Garcıa, V. M. A., Ruiz, M. P. P., & Perez, J. R. P. (2010). Voice interactive classroom, a service-oriented soft-ware architecture for speech-enabled learning. Journal of Network and Computer Applications, 33, 603–610. doi:10.1016/j.jnca.2010.03.005.

Garoui, V. (2005). Analysis of network traffic in ad-hoc networks based on DSDV protocol with emphasis on mobility and communication patterns. Paper presented at the first IEEE and IFIP International Conference in Central Asia. New Delhi, India.

Georges, J., Divoux, T., & Rondeau, E. (2002). Evaluation of switched ethernet in an industrial context using the network calculus. In Proceedings of the 4th IEEE Inter-national Workshop on Factory Communication Systems, (pp. 19-26). Vasteras, Sweden: IEEE.

Page 9: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

419

Georges, J., Divoux, T., & Rondeau, E. (2003). Comparison of switched ethernet architecture models. In Proceedings IEEE Conference on Emerging Technologies and Factory Automation, (pp. 375-382). Lisbon, Portugal: IEEE.

Georges, J., Divoux, T., & Rondeau, E. (2005). Confront-ing the performances of a switched ethernet network with industrial constraints by using network calculus. International Journal of Communication Systems, 18, 877–903. doi:10.1002/dac.740.

Gerber, E., & Kirchner, C. (2001). Who’s surfing? Inter-net access and computer use by visually impaired youths and adults. Journal of Vision Impairment and Blindness, 95, 176–181.

Gerd, K. (1989). Local area networks. New York: McGraw-Hill.

Ghaleb, F. F. M., Daoud, S. S., Hasna, A. M., Jaam, J. M., & El-Sofany, H. F. (2006). A web-based e-learning system using semantic web framework. Journal of Computer Science, 2(8), 619–626. doi:10.3844/jcssp.2006.619.626.

Gil, A., & García-Penalvo, F. J. (2008). Learner course recommendation in e-learning based on swarm intelli-gence. Journal of Universal Computer Science, 14(16), 2737–2755.

Gilbert, E. N. (1960). Capacity of a burst-noise channel. The Bell System Technical Journal, 39, 1253–1265.

Gillett, B. E. (1979). Operations research – A computer-oriented algorithmic approach. New Delhi: Tata McGraw-Hill Publishing Company Ltd..

Giordano, S., O’Connell, N., Pagano, M., & Procissi, G. (1999). A variational approach to the queuing analysis with fractional brownian motion input traffic. In Proceedings of the 7th IFIP Workshop on Performance Modelling and Evaluation of ATM Networks. Antwerp, Belgium: IFIP.

Gisin, N., Ribordy, G., Tittel, W., & Zbinden, H. (2002). Quantum cryptography. Reviews of Modern Physics, 74, 145–195. doi:10.1103/RevModPhys.74.145.

Gloss. (2004). Retrieved from http://www.abc.net.au/pipeline/radio/programs/gloss2.htm

Gluzman, S., & Sornette, D. (2002). Log-periodic route to fractal functions. Physical Review Letters E, 6503(3), 418–436.

Goldsmith, A. (2005). Wireless communications. Cam-bridge, UK: Cambridge University Press. doi:10.1017/CBO9780511841224.

Golob, M. (2000). Decomposition of a fuzzy control-ler based on the inference break-up. (Doctoral Thesis). University of Maribor, Maribor, Slovenia.

Golubchikov, D. M., & Rumiantsev, K. E. (2008). Quantum cryptography: Principle, protocol, system. All-Russian competitive selection analytical survey in priority guidelines of information and telecommunica-tion systems. Retrieved from http://www.ict.edu.ru/ft/005712/68358e2-st14.pdf

Golubchikov, D. M. (2008). Structure and operation prin-ciples of Id 3000 Clavis system. Proceedings of the South Federal University Technical Sciences, 3(80), 149–157.

GPP TR 25.814. (2006). Physical layer aspects for E-UTRA. Technical Specification Version 7.1.0. Retrieved from http://www.3gpp.org

Greenberger, M., Crenson, M., & Crissey, B. (1976). Models in the policy process: Public decision making in the computer era. New York: Russel Sage Foundation.

Grossglanster & Bolot. (1996). On the relevance of long range dependence in network traffic. In Proceedings of ACM SIGCOMM ’96. San Francisco, CA: ACM.

Halsall, F. (1992). Data communications. In Computer Net-works and Open Systems. Reading, MA: Addison-Wesley.

Hamlin, J. L. (1979).Productivity appraisal for mainte-nance centre, Industrial Engineering, 11(9), September, 1979.

Hammond, A. (2006). MagiQ and Verizon smash distance and cost barriers with world’s longest cascaded network for practical quantum cryptography. New Technology Enables Ultra Secure Communications. Business Wire.

Hasna, M. O., & Alouini, M. S. (2003). End-to-end performance of transmission systems with relays over Rayleigh-fading channels. IEEE Transactions on Wire-less Communications, 2(6), 1126–1131. doi:10.1109/TWC.2003.819030.

Hassan, I. M. M., & Mohamed, A. M. (2001). Variable structured control of a magnetic levitation system. In Proceedings of the American Control Conference. Ar-lington, VA: IEEE Press.

Page 10: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

420

Hauge, J. W., & Paige, K. N. (2004). Learning Simul8: The complete guide. Billingham, UK: PlainVu Publishers.

Haykin, S. (1994). Communication systems. New York: John Wiley & Sons, Inc..

Heiyanthuduwage, S. R., & Karunaratne, D. D. (2006). A learner oriented ontology of metadata to improve effec-tiveness of learning management systems. In Proceedings of the Third International Conference on E-Learning for Knowledge-Based Society. Bangkok, Thailand: IEEE.

Henderson, A. H., Durkin, C. J., & Durkin, G. D. (2008). Finding the right small-scale distribution for a measured indoor 2.4 GHz channel. Paper presented at the IEEE An-tennas and Propagation Society International Symposium (APSURSI 2008). San Diego, CA.

Hertrich, D. (2002). MPEG4 video transmission in wire-less LANs-Basic QoS support on the data link layer of 802.11b. (Minor Thesis).

Hohlfeld, O. (2008). Markovian packet loss generators and video QoE. T Systems. Tcpdump.org. (n.d.). Retrieved from http://www.tcpdump.org

Holma & Toskala. (2009). LTE for UMTS: OFDMA and SC-FDMA based radio access. New York: Wiley & Sons.

Holohan, E., Melia, M., McMullen, D., & Pahl, C. (2005). Adaptive e-learning content generation based on semantic web technology. In Proceedings of Work-shop on Applications of Semantic Web Technologies for E-Learning (SW-EL). Amsterdam: SW-EL. Retrieved from http://www.win.tue.nl/SW-EL/2005/swel05-aied05/proceedings/5-Holohan-final-full.pdf

Holzinger, A., Smolle, J., & Reibnegger, G. (2006). Learning objects (LO): An object-oriented approach to manage e-learning content. In Encyclopedia of Information in Healthcare & Biomedicine. Hershey, PA: IGI Global.

Huang, P., & Heidemann, J. (2000). Capturing TCP burstiness for lightweight simulation. In Proccedings of Engineering and Networks Laboratory. Zurich, Swit-zerland: IEEE.

Hu, J., & Beaulieu, N. C. (2007). Performance analysis of decode-and forward relaying with selection combin-ing. IEEE Communications Letters, 11(6), 489–491. doi:10.1109/LCOMM.2007.070065.

Hwang, W. L., & Mallat, S. (1994). Characterization of self-similar multifractals with wavelet maxima. Journal of Applied and Computational Harmonic Analysis, 1, 316–328. doi:10.1006/acha.1994.1018.

Id Quantique, S. A. (2005). Id 3000 Clavis: Plug & play quantum cryptography. Specifications, 2.1. Retrieved from http://www.idquantique.com/images/stories/PDF/clavis2-quantum-key-distribution/clavis2-specs.pdf

Id Quantique, S. A. (2005). Id 5000 Vectis. Specifica-tions, 1.2. Retrieved from http://www.idquantique.com/images/stories/PDF/clavis2-quantum-key-distribution/clavis2-specs.pdf

Id Quantique, S. A. (2008). Quantum cryptography. The Key to Future-Proof Confidentiality, 3.1. Retrieved from http://www.idquantique.com/images/stories/PDF/clavis2-quantum-key-distribution/clavis2-specs.pdf

Id Quantique, S. A. (2010). Practical quantum cryptog-raphy. Paper presented at the Session of Second Winter School. New York, NY.

Id Quantique. (2011). Swiss bank encrypts critical low-latency backbone links with the Id Quantique centauris encryptors. Retrieved from http://www.idquantique.com/news/swissquote.html

IEEE. (2006). Layered video coding offset distortion traces for tracebased evaluation of video quality after network transport. In Proceedings of IEEE Consumer Communications and Networking Conference CCNC. Las Vegas, NV: IEEE.

Ietf.org. (n.d.a). Request for comments 2544. Retrieved August 20, 2009 from http://www.ietf.org/rfc/rfc2544

Ietf.org. (n.d.b). Integrated services mappings on IEEE 802 networks. Retrieved August 20, 2009 from http://tools.ietf.org/html/rfc2815

Iglin, S. P. (2006). Probability theory and the mathematical statistics on the basis of MATLAB: The manual. Kharkov, Ukraine: NTU.

Ikhu-Omoregbe, N. A. (2010). Development of a formal framework for usable operations support in e-health-based systems. (Doctoral dissertation). Covenant University, Ota, Nigeria.

Page 11: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

421

Ikki, S. S., & Ahmed, M. H. (2007). Performance analysis of cooperative diversity wireless networks over Nakagami-m fading channels. IEEE Communications Letters, 11(4), 334–336. doi:10.1109/LCOM.2007.348292.

Ikki, S. S., & Ahmed, M. H. (2010). Performance analysis of adaptive decode-and-forward cooperative diversity networks with best-relay selection. IEEE Trans-actions on Communications, 58(1), 68–72. doi:10.1109/TCOMM.2010.01.080080.

Ikuno, Wrulich, & Rupp. (2010). System level simulation of LTE networks. In Proceedings of Vehicular Technol-ogy Conference (VTC ‘10). Taipei, Taiwan: IEEE Press.

Information and Communication Technologies. (n.d.). ADAMANTIUM. D4.4 - PQoS Models and Adaptation Mechanisms. Retrieved from www.ict-adamantium.eu

International Telecommunication Union Radiocommu-nication Sector (ITU-R). (1999). Prediction methods for the terrestrial land mobile service in the VHF and UHF bands. ITU-R.

Ipatov, V. (2007). Wideband systems and CDMA: Prin-ciples and applications. Moscow, Russia: Technosphera.

Iskander, M., Yun, Z., & Zhang, Z. (2001). Outdoor/indoor propagation modeling for wireless communica-tions systems. Paper presented at the IEEE Antennas and Propagation Society International Symposium (APSURSI 2001). Boston, MA.

Islam, M. D., Kubo, I., Ohadi, M., & Alili, A. A. (2009). Measurement of solar energy radiation in Abu Dhabi, UAE. Applied Energy, 86, 511–515. doi:10.1016/j.ap-energy.2008.07.012.

ISO 9241-11. (1998). Ergonomic requirements for office work with visual display terminals (VDTs) - Part 11: Guidance on usability. Geneva, Switzerland: ISO.

ISO-IEC. (1994). International standard 13 818. Generic coding of moving pictures and associated audio informa-tion. ISO-IEC.

ISO-IEC/JTC1/SC29/WG11. (1996). Evaluation methods and procedures for July mpeg-4 tests. ISO-IEC.

ITU. (n.d.). P.800: Methods for subjective determination of transmission quality. Retrieved from http://www.itu.int/rec/T-REC-P.800-199608-I/en

ITU-R BT. (n.d.). Methodology for the subjective as-sessment of the quality of television pictures. ITU-R BT..

ITU-T. (1996). Subjective video quality assessment methods for multimedia applications, interactive test methods for audiovisual communications, principles of a reference impairment system for video. Recommenda-tions (p. 910). ITU-T.

ITU-T. (1999). Narrow-band visual telephone systems and terminal equipment. Recommendation H.320. ITU-T.

Jaffard, S. (1997). Multifractal formalism for functions parts I and II. SIAM Journal on Mathematical Analysis, 28(4), 944–998. doi:10.1137/S0036141095282991.

Jain, A. K. (1974). Noncausal representation for finite discrete signals. In Proceedings of IEEE Conference on Decision and Control. IEEE Publishing.

Jain, A. K., & Rangansth, S. (1980). Image coding by autoregressive synthesis. In Proceedings of ICASSP’80. IEEE.

Jain, Chiu, & Hawe. (1984). A quantitative measure of fairness and discrimination for resource allocation in shared systems. Technical Report: Digital Equipment Corporation, DEC-TR-301.

Jain, A. K., & Jain, J. R. (1978). Partial differential equa-tions and finite difference methods in image processing, part II: Image restoration. IEEE Transactions on Automatic Control, 23, 817–834. doi:10.1109/TAC.1978.1101881.

Jain, A. K., & Wang, S. H. (1977). Stochastic image models and hybrid coding. NOSC.

Jain, L. C., & Martin, N. M. (1998). Fusion of neural network, fuzzy systems, and genetic algorithms: Industrial applications. Boca Raton, FL: CRC Press International.

Jakes, W. C. (Ed.). (1974). Microwave mobile communi-cations. New York: Wiley Interscience.

Jamalipour, A & Tekinay. (Eds.). (2001). Fourth generation wireless networks and interconnecting standards. IEEE Personal Communications, 8.

Jang. (1993). ANFIS: Adaptive network-based fuzzy inference system. IEEE Transactions on Systems, Man, and Cybernetics, 23(3), 665-685.

Page 12: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

425

MacLeod, H., Loadman, C., & Chen, Z. (2005). Ex-perimental studies of the 2.4-GHz ISM wireless indoor channel. Paper presented at the Annual Communication Networks and Services Research Conference (CNSR 2005). Halifax, Canada.

MagiQ Technologies, Inc. (2004). QPN 5505. Reference Manual.

Mallat, S. (2005). A wavelet tour of signal processing: The sparse way (3rd ed.). New York: Academic Press.

Mandelbrot, B. (1982). The fractal geometry of nature. San Francisco, CA: Freeman.

Mann, R., & Terplan, K. (1999). Network design: Manage-ment and technical perspectives. New-York. CRC Press.

Mao, W. (2003). Modern cryptography: Theory and practice. Upper Saddle River, NJ: Prentice Hall.

Marpe, D., Wiegand, T., & Sullivan, G. J. (2006). The H.264/MPEG4 advanced video coding standard and its applications. IEEE Communications Magazine, 44(8), 134–143. doi:10.1109/MCOM.2006.1678121.

Martin, S., Minet, P., & George, L. (2005). End-to-end response time with fixed priority scheduling: Trajectory approach versus holistic approach. International Journal of Communication Systems, 18, 37–56. doi:10.1002/dac.688.

Mathur, R., Klepal, M., McGibney, A., & Pesch, D. (2004). Influence of people shadowing on bit error rate of IEEE 802.11 2.4 GHz channel. Paper presented at the International Symposium on Wireless Communication Systems (ISWCS 2004). Port-Louis, Mauritius.

Mathwork Inc. (2011). Fuzzy logic toolbox user guide version 2.2.14. Retrieved from www.mathworks.com

Mathworks. (1998). Retrieved from http://www.math-works.com

Matloff. (2000). Some utilization analyses for ALOHA and CSMA protocols. Davis, CA: University of California at Davis.

Mayers, D. (2001). Unconditional security in quan-tum cryptography. Journal of the ACM, 48, 351–406. doi:10.1145/382780.382781.

McGill, W. J. (1954). Multivariate information transmis-sion, transactions PGIT. In Proceedings of Symposium on Information Theory. PGIT.

Meyer, Y. (1997). Wavelets, vibrations, and scalings. Montreal, Canada: Universite de Montreal.

Micheal, D., & Richard, R. (2003). Computer commu-nications and data networks for computer scientists and engineers. Essex, UK: Pearson Prentice Hall.

Minaev, A., Bashkov, E., Anoprienko, A., Kargin, A., Teslia, V., & Babasyuk, A. (2002). Development of internet infrastructure for higher education in Donetsk region of the Ukraine. In Proceedings of ICEE 2002 Manchester International Conference on Engineering Education. Manchester, UK: ICEE.

Ming-Yang, X., Rong, L., & Huimin, C. (2004). Predicting internet end-to-end delay: An overview. In Proceedings of the IEEE 36th South Eastern Symposium on Information Systems Theory, (pp. 210 – 214). IEEE.

MIT Lincoln Laboratory. (2012). 1999 DARPA intrusion detection evaluation dataset. Retrieved from http://www.ll.mit.edu/mission/communications/ist/corpora/ideval/data/index.html

Modestino, J. W., & Zhang, J. (1993). A Markov random field model-based approach to image interpretation. In Markov Random Fields: Theory and Applications. Boston: Academic Press, Inc..

Motiwalla, L. F. (2009). A voice-enabled interactive services (VòIS) architecture for e-learning. International Journal on Advances in Life Sciences, 1(4), 122–133. Re-treived from http://www.iariajournals.org/life_sciences/lifsci_v1_n4_2009_paged.pdf

Motiwalla, L. F., & Qin, J. (2007). Enhancing mobile learning using speech recognition technologies: A case study. In Proceedings of the Eighth World Congress on the Management of eBusiness (WCMeB’07). WCMeB.

Murai, M. & Tanaka, M. (2000). Magnetic levitation (maglev) technologies. Japan Railway & Transport Review, (25), 61–67.

Page 13: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

424

KSL. (2005). KSL software and network services. Re-trieved from http://www.ksl.stanford.edu/sns.shtml

Kulman, N. K. (1961). Nonlinear filter for telegraph signal filtering. Radio Engineering and Electronics, 1(9), 67–79.

Kumar, A. B. R., Reddy, L. C., & Hiremth, P. S. (2008). Performance comparison of wireless mobile ad-hoc net-work routing protocols. International Journal of Computer Science and Network Security, 8(6), 337–343.

Kusagur, K., & Ram, S. (2010). Modeling, design, & simulation of an adaptive neuro-fuzzy inference system (ANFIS) for speed control of induction motor. Interna-tional Journal of Computers and Applications, 6(12), 29–44. doi:10.5120/1123-1472.

Kuznetsov, S. P. (2000). Dynamic chaos (lecture course). Moscow, Russia: Nauka.

Lakshman, T., Ortega, A., & Reibman, A. (1998). VBR video: Tradeoffs and potentials. Proceedings of the IEEE, 86(5), 952–973. doi:10.1109/5.664282.

Langton, C. (2004). Orthogonal frequency divisional multiplexing tutorial. Retrieved from www.complexto-real.com

Larson, J. (2000). Introduction and overview of W3C speech interface framework. W3C Working Draft. Re-trieved from http://www.w3.org/TR/2000/WD-voice-intro-20001204/

Le Boudec, J., & Thiran, P. (2004). Network calculus: Theory of deterministic queuing systems for the internet. Berlin: Springer.

Lebedev, A. I., & Sherniavskovo, E. A. (1986). Probability method in computing texnika: Educational manual for institutes of higher learning on special. Computer.

Lee, J. B., & Kalva, H. (2008). The VC-1 and H.264 video compression standards for broadband video services. Berlin: Springer. doi:10.1007/978-0-387-71043-3.

Lee, J. S., & Miller, L. E. (1998). CDMA systems engineer-ing handbook. Norwood, MA: Artech House.

Lemmon, J. (2002). Wireless link statistical bit error model. NTIA Report. 02-394. Washington, DC: US Department of Commerce.

Lerlerdthaiyanupap, T. (2008). Speech-based diction-ary application. (MSc Thesis). University of Tampere, Tampere, Finland.

Lezin, Y. S. (1969). Optimal filters with pulse signal ac-cumulation. Moscow, Russia: Sovetskoe Radio Publishing.

Lilly, M. T., Obiajulu, U. E., Ogaji, S. O. T., & Probert, S. D. (2007). Total-productivity analysis of a Nigerian petroleum-product marketing company. Applied Energy, 84, 1150–1173. doi:10.1016/j.apenergy.2007.04.003.

Lima, A., & Menezes, L. (2005). Motley-Keenan model adjusted to the thickness of the wall. Paper presented at the SBMO/IEEE MTT-S International Microwave and Optoelectronics Conference. Brasilia.

Lin, W. J., Yueh, H. P., Liu, Y. L., Murakami, M., Kakusho, K., & Minoh, M. (2006). Blog as a tool to develop e-learning experience in an international distance course. In Proceedings of the Sixth International Conference on Advanced Learning Technologies (ICALT’06). ICALT.

Liu, X., Chong, E., & Shroff, N. (2001). Opportunistic transmission scheduling with resource-sharing constraints in wireless networks. IEEE Journal on Selected Areas in Communications, 19, 2053–2064. doi:10.1109/49.957318.

Lobinger, S. Jansen, & Balan. (2010). Load balancing in downlink LTE self-optimizing networks. In Proceedings of IEEE 71st Vehicular Technology Conference 2010. Taipei, Taiwan: IEEE Press.

Lott, M., & Forkel, I. (2001). A multi wall and floor model for indoor radio propagation. Paper presented at the IEEE Vehicular Technology Conference (VTC 2001-Spring). Rhodes Island, Greece.

Lottor. (1992). Internet growth (1981-1991). RFC 1296.

Lui, Z., Nain, P., Towsley, D., & Zhang, Z. L. (1999). Asymptotic behavior of a multiplexer fed by a long-range dependent process. Journal of Applied Probability, 36, 105–118. doi:10.1239/jap/1032374233.

M. of WINNER. (2005). Assessment of advanced beamforming and MIMO technologies. WINNER, IST-2003-507581.

Page 14: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

423

Katende, J. (2004). Linear systems theory. (Unpublished Master’s Thesis). Bayero University, Kano, Nigeria.

Kemal, N. A. (2003). Control of magnetic suspension system using state feedback, optimal, and neural network controllers. (Unpublished Master’s of Engineering The-sis). Bradley University, Maribor, Slovenia.

Khan. (2009). LTE for 4G mobile broadband: Air interface technologies and performance. Cambridge CB2 8RU. Cambridge, UK: Cambridge University Press.

Kilin, S. Y., Nizovtsev, A. P., & Horoshko, D. B. (2007). Quantum cryptography: Ideas and practice. Minsk, Belarus: Belaruskaya Nauka.

Kirk Nordstrom, D. (2012). Models, validation, and ap-plied geochemistry: Issues in science, communication, and philosophy. Applied Geochemistry. doi:10.1016/j.apgeochem.2012.07.007.

Klaue, J., Rathke, B., & Wolish, A. (2003). EvalVid-A framework for video transmission and quality evaluation. In Proceedings of the 13th International Conference on Modelling Techniques and Tools for Computer Perfor-mance Evaluation. Urbana, IL: IEEE.

Klienrok, L. (1979). Computing systems with queuing.

Knoche & McCarthy. (n.d.). Mobile users’ needs and expectations of future multimedia services. Wireless World Research Forum.

Knopp, R., & Humblet, P. (1995). Information capacity and power control in single-cell multiuser communica-tions. In Proceedings of IEEE International Conference on Communication. Seattle, WA: IEEE Press.

Knox, S., Coyle, L., & Dobson, S. (2010). Using ontolo-gies in case-based activity recognition. In Proceedings of 23rd Florida Artificial Intelligence Research Society Conference. St. Pete, FL: AIRSC.

Koeppl, G. W. (1982). Putnam’s power from the wind. New York: Van Nostrand Reinhold.

Kolias, C., Kolias, V., & Anagnostopoulos, L. (2004). A pervasive wiki application based on voiceXML. Retrieved from http://www.icsd.aegean.gr/publication_files/confer-ence/275294916.pdf

Kolkeri, V. (2008). Error concealment techniques in H.264/AVC for video transmission over wireless network. Arlington, TX: The University of Texas at Arlington.

Kondratova, I. (2009). Multimodal interaction for mobile learning. In Proceedings of the 5th International Confer-ence (UAHCI ‘09). San Diego, CA: UAHCI.

Konikow, L. F., & Bredehoeft, J. D. (1992). Ground-water models cannot be validated. Advances in Water Resources, 15(1), 75–83. doi:10.1016/0309-1708(92)90033-X.

Korolenko, P. V., Maganova, M. S., & Mesniankin, A. V. (2004). Innovation methods of the analysis of stochastic processes and structures in optics: Fractal and multiracial methods, wavelet-conversions: The manual. Moscow, Rus-sia: MSU, Nuclear Physics, Scientific Research Institute.

Kotenko, V. V., & Rumiantsev, K. E. (2009). Information theory and telecommunication security. Rostov-on-Don, Russia: SFedU publishers.

Koutsakis, P., & Paterakis, M. (2004). Call-admission-control and traffic-policing mechanisms for the trans-mission of videoconference traffic from MPEG-4 and H.263 video coders in wireless ATM networks. IEEE Transactions on Vehicular Technology, 53(5), 1525–1530. doi:10.1109/TVT.2004.833639.

Krasheninnikov, B. P. (2003). Fundamentals of the image processing theory. Ulyaniovsk, Russia: UlGTU Publ.

Kravchenko, V. F., Perez-Meana, H. M., & Ponomaryov, V. I. (2009). Adaptive digital processing of multidimentional signals with applications. Moscow, Russia: Fizmatlit.

Krishna, P., Jens, S., & Ralf, S. (2004). Network calculus meets queuing theory: A simulation-based approach to bounded queues. In Proceedings of the 12th IEEE Inter-national Workshop on Quality of Service (IWQoS 2004), (pp. 114-118). Montreal, Canada: IEEE.

Krunz, M., Sass, R., & Hughes, H. (1995). Statistical characteristics and multiplexing of MPEG streams. In Proceedings of IEEE INFOCOM. Boston: IEEE.

Krunz, M., & Tripathi, S. (1997). Exploiting the temporal structure of MPEG video for the reduction of bandwidth requirements. Proceedings - IEEE INFOCOM, 1(1), 67–74. doi:10.1109/INFCOM.1997.635115.

Page 15: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

422

Jang, J., & Lee, K. (2003). (n.d.). Transmit power adapta-tion for OFDM systems. IEEE Journal on Selected Areas in Communication.[Qos requirement for multimedia services. IEEE Press.]. Ignacio & Javier.

Jasperneite, J., & Ifak, N. (2001). Switched ethernet for factory communication. In Proceedings 8th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA 2001), (pp. 205-212). Antibes, France: IEEE.

Jasperneite, J., Neumann, P., Theis, M., & Watson, K. (2002). Deterministic real-time communication with switched ethernet. In Proceedings of the 4th IEEE Inter-national Workshop on Factory Communication Systems, (pp. 11-18). Vasteras, Sweden: IEEE.

Jianhua, W., Long, Z., Jun, Z., & Xiping, D. (2009). A voiceXML-based mobile learning system and its cach-ing strategy. In Proceedings of MLearn 2009, 8th World Conference on Mobile and Contextual Learning. Orlando, FL: IEEE.

Jine, A. K. (1981). Achievements in the field of mathemati-cal models for image processing. TIEEE, 69(5), 9–39.

John Wiley and Sons, Inc. (2009). Algorithms and proto-cols for wireless and mobile ad hoc networks. New York: John Wiley & Sons, Inc..

John, S.N., Anoprienko, A.Y., & Niru, A. (n.d.). Multilevel simulation of networks on the base of TCP/IP protocols stack using Matlab/Simulink environment. Cybernetic and Computing Texnika, 39, 271–297.

John, S.N., Anoprienko, A.Y., Rishka, S.V. (n.d.). Simulat-ing of university network infrastructure. Kremeshuk State Technical University, 2(11), 271–297.

John. (2005). Increasing the efficiency of data exchange in a computer network based on the protocol of TCP/IP suite. Information, Cybernetics, and Computing Engi-neering, 93, 256-264.

John, S. N., Anoprienko, A. A., & Okonigene, R. E. (2010). Developed algorithm for increasing the efficiency of data exchange in a computer network. International Journal of Computers and Applications, 6(9), 16–19. doi:10.5120/1103-1446.

Joo, S., & Seo, J. H. (1997). Design and analysis of the non-linear feedback linearizing control for an electromagnetic suspension system. IEEE Transactions on Control Systems Technology, 5(1), 135–144. doi:10.1109/87.553672.

Jurdak, R. (2007). Wireless ad hoc and sensor networks: A cross-layer design perspective. New York: Springer.

Justus, C. G. (1978). Winds and wind system performance. Philadelphia, PA: Franklin Institute Press.

Kalantari, A., Mohammadi, M., & Ardebilipour, M. (2011). Performance analysis of opportunistic relaying over imperfect non-identical lognormal fading channels. In Proceedings of 22nd IEEE Personal Indoor Mobile Radio Communications (PIMRC11 - WACC). Toronto, Canada: IEEE Press.

Kamau, J. N., Kinyua, R., & Gathua, J. K. (2010). 6 years of wind data for Marsabit, Kenya average over 14 m/s at 100 m hub height: An analysis of the wind energy poten-tial. Renewable Energy, 36(6), 1298–1302. doi:10.1016/j.renene.2009.10.008.

Kanem, E., Torab, P., Cooper, K., & Custodi, G. (1999). Design and analysis of packet switched networks for control systems. In Proceedings1999 IEEE Conference on Decision and Control, (pp. 4460-4465). Phoenix, AZ: IEEE.

Kapranov, M. V., & Khandurin, A. V. (2009). Information transmission with fractal masking (framask) in com-munication system[in Russian]. Vestnik MPEI, 1, 89–92.

Kapranov, M. V., & Khandurin, A. V. (2011). Signals with additive fractal structure for information transmis-sion. Journal of Electromagnetic Waves and Electronic Systems, 16(2), 23–36.

Kapranov, M. V., & Morozov, A. G. (1998). Application of chaotic modulation for information transfer. Radio-technicheskie Tetrady, 14, 66–71.

Kapranov, M. V., & Tomashevsky, A. I. (2003). System of secure communication with usage of correlative reception and the synchronous chaotic response. Journal of Elec-tromagnetic Waves and Electronic Systems, 8(3), 35–48.

Kashyap, R. L. (n.d.). Analysis and synthesis of image patterns by spatial interaction models. In Progress in Pattern Recognition. New York: Elsevier North-Holland.

Page 16: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

426

Murali, K., Leung, H., & Yu, H. (2003). Design of noncoherent receiver for analog spread-spectrum com-munication based on chaotic masking. IEEE Journal, 50(3), 432–441.

Muzy, J. F., Bacry, E., & Arneodo, A. (1994). The muiti-fractal formalism revisited with wavelets. International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 4, 245. doi:10.1142/S0218127494000204.

Muzy, J. F., Bacry, E., & Arneodo, A. (1999). Wavelets and multifractal formalism for singularity signals: Ap-plication to turbulence data. Physical Review Letters, 67(25), 3515–3518. doi:10.1103/PhysRevLett.67.3515.

Nagle. (1984). Congestion control in IP/TCP internet-works. RFC 896.

Nahi, N. E., & Franco, C. A. (1972). Application of Kalman filtering to image enhancement. In Proceedings of IEEE Conference on Decision and Control. IEEE Publishing.

Nanda, S. K., & Balachandran, S., & Kumar. (2000, January). Adaptation techniques in wireless packet data services. IEEE Communications Magazine. doi:10.1109/35.815453.

Nanere, M., Fraser, I., Quazi, A., & D’Souza, C. (2007). Environmentally adjusted productivity measurement: An Australian case study. Journal of Environmental Manage-ment, 85, 350–362. doi:10.1016/j.jenvman.2006.10.004 PMID:17129666.

National Research Council. (2007). Models in environ-mental regulation decision making. Washington, DC: The National Academies Press.

News. (n.d.). Retrieved from http://www.gap-optique.unige.ch

Ngala, G. M., Alkali, B., & Aji, M. A. (2007). Viability of wind energy as a power generation source in Maidu-guri, Borno state, Nigeria. Renewable Energy, 32(13), 2242–2246. doi:10.1016/j.renene.2006.12.016.

Nicopolitidis. (2003). Wireless networks. London: Wiley.

Niels, O. B. (2000). Draft position paper for discussion at the ELSNET brainstorming workshop. Retrieved from http://www.elsnet.org/dox/rM-bernsen-v2.pdf

Nisbet, P. D., & Wilson, A. (2002). Introducing speech recognition in schools: Using dragon natural speaking. Edinburgh, UK: University of Edinburgh.

Norros, I. (1994). A storage model with self-similar input. Queueing Systems, 16, 387–396. doi:10.1007/BF01158964.

NS-2 Documentation. (n.d.). Retrieved from http://www.isi.edu/nsnam/ns/ns-documentation.html

NUC. (2004). The state of Nigerian universities. Nigerian University System Newsletter, 2(1).

Oboko, R., Wagacha, P. W., & Omwenga, E. (2008). Adap-tive delivery of an object oriented course in a web-based learning environment. In Proceedings of 3rd International Conference on ICT for Development, Education, and Training. Accra, Ghana: IEEE.

Ogata, K. (2002). Modern control engineering. New Delhi: Prentice-Hall.

Olifer, V. G., & Olifer, N. A. (1999). Principles of tech-nologies, protocols–SPB. Computer Networks.

Ondas, I. S. (2006). VoiceXML-based spoken language interactive system. In Proceedings 6th PhD Student Con-ference and Scientific and Technical Competition of Stu-dents of Faculty of Electrical Engineering and Informatics Technical University of Košice. Košice, Slovakia: IRKR. Retrieved from http://irkr.tuke.sk/publikacie/_vti_cnf/Prispevok_eng.pdf

Onwugbolu, C. A., & Oloruniwo, F. (1988). Measuring maintenance productivity.(Presented paper.). Cincinnati, OH: The Computer Aided Manufacturing Conference.

Oppenheim, A., & Schafer, R. (1989). Discrete-time signal processing. Upper Saddle River, NJ: Prentice-Hall.

Ozerdem, B., & Turkeli, M. (2003). An investigation of wind characteristics on the campus of Izmir Institute of Technology, Turkey. Renewable Energy, 28, 1013–1027. doi:10.1016/S0960-1481(02)00155-6.

Pakucs, B. (2003). SesaME: A framework for personalised and adaptive speech interfaces. In Proceedings of EACL-03 Workshop on Dialogue Systems: Interaction, Adaptation and Styles of Management. Budapest, Hungary: EACL.

Page 17: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

427

Parida, A., & Kumar, U. (2009). Maintenance Productivity and performance measurement. Handbook of Mainte-nance and Engineering. London: Springer-Verlag Ltd..

Park, K., & Willinger, W. (Eds.). (1999). Self-similar network traffic and performance evaluation. New York: Wiley-Interscience.

Parsons, J. D. (2000). The mobile radio propaga-tion channel. Hoboken, NJ: Wiley Interscience. doi:10.1002/0470841524.

Paul, D. (2003). Speech recognition for students with disabilities. Edinburgh, UK: University of Edinburgh.

Pauli, D. (2009). Aussie govt considers quantum leap in secure comms. Computer World. Retrieved from http://www.computerworld.com.au/article/278658/aus-sie_govt_considers_quantum_leap_secure_comms/

Pecora, L. M., & Carroll, T. L. (1990). Synchronization in chaotic systems. Physical Review Letters, 64, 821–824. doi:10.1103/PhysRevLett.64.821 PMID:10042089.

Peter, Y., Vantroys, T., & Lepretre, E. (2008). Enabling mobile collaborative learning through multichannel inter-actions. In Proceedings of 4th International Conference on Interactive Mobile and Computer Aided Learning (IMC’08). IMC.

Petersen & Davie. (2000). Computer networks: A systems approach. San Francisco, CA: Morgan Kaufmann.

Petrov, E. P., & Trubin, I. S. (2007). Mathematical models of video-sequences of digital half-tone images. Achieve-ments of Modern Radio Electronic, (6), 3-31.

Petrov, E. P., Smolskliy, S. M., & Kharina, N. L. (2007). Synthesis of models of multi-dimensional multi-valued Markov processes. Vestnik of MPEI, (1), 147-152.

Petrov, E. P., Trubin, I. C., & Butorin, E. L. (2002). The spatial-time model of digital Markov images. In Proceed-ings of VIII Conference: Radar Technology, Navigation, and Communications, (vol. 1, pp. 371-380). Voronezh, Russia: RTNC.

Petrov, E. P., Trubin, I. C., & Butorin, E. L. (2003). The spatial-time model of digital Markov images. In Proceed-ings of IX Conference of Radar Technology, Navigation, and Communications, (vol. 1, pp. 330-337). Voronezh, Russia: RTNC.

Petrov, E. P., Trubin, I. S., & Chastikov, I. A. (2007). Nonlinear filtering of video-sequences of digital half-tone images of Markovian type. Achievements of Modern Radio Electronic, (3), 54-88.

Petrov, E.P., Trubin, I.S., & Tikhonov, E.P. (2003). Nonlinear digital filtering of half-tone images. Radio Engineering, (5), 7-10.

Petrov, E. P. (2006). The spatial-time mathematical model of the sequence of digital half-tone image of Markov type. Problems of Information Processing, 1(6), 46–52.

Petrov, E. P., & Chastikov, A. V. (2001). Method of adap-tive filtering of binary pulse correlated signals. Radio Engineering and Electronics, 46(10), 1155–1158.

Petrov, E. P., & Kharina, N. L. (2006). Simulation of digital half-tone images of Markovian type with discrete argu-ments. Vyatka, Russia: Vyatka State University Publishing.

Petrov, E. P., & Prozorov, D. E. (n.d.). Filtering of Markov processes with several states. Radar, Navigation, and Communications..

Petrov, E. P., Trubin, I. S., & Butorin, E. L. (2005). Non-linear filtering of the sequence of digital half-tone images. Radio Engineering and Electronics, 50(10), 1265–1270.

Petrov, E. P., Trubin, I. S., & Harina, N. L. (2006). Model-ing of multi-dimensional multi-valued Markov processes. Radio Engineering.

Petrov, E. P., Trubin, I. S., & Harina, N. L. (2006). Prob-lems of information processing. Vestnik, 1(6), 41–46.

Phuah, J., Lu, J., & Yahagi, T. (2005). Chattering free sliding mode control in magnetic levitation systems. Chiba, Japan: Chiba University. doi:10.1541/ieejeiss.125.600.

Pisarevsky, A. N., & Chernyavsky, A. F. (1988). Systems of technical vision (principal fundamentals, hardware and software support). Leningrad, Russia: Mashinostroenie Publishing.

Politis, D. N. (1994). Markov chains in many dimensions. Advances in Applied Probability. doi:10.2307/1427819.

Portet, F., Reiter, E., Gatt, A., Hunter, J. R. W., Sripada, S., Freer, Y., & Sykes, C. (2009). Automatic generation of textual summaries from neonatal intensive care data. Artificial Intelligence, 173, 789–816. doi:10.1016/j.artint.2008.12.002.

Page 18: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

428

Postel, J. (1980). User datagram protocol. RFC 768.

Postel, J. (1981a). Internet protocol. RFC 791.

Postel, J. (1981b). Transmission control protocol. RFC 793.

Priel, V. Z. (1974). Systematic maintenance organisation. London: MacDonald & Evans Ltd..

Project P905-PF EURESCOM. (2000). Aquavit-Assess-ment of quality for audio-visual signals over internet and UMTS. EURESCOM.

Prudnikov, A. P., Brychkov, Y. A., & Marichev, O. I. (1992). Integrals and series: Vol. 4. Direct laplace transforms. Boca Raton, FL: CRC Press.

Qasim, Said, & Aghvami. (2009). Mobile ad hoc network-ing protocols evaluation through simulation for quality of service. IAENG International Journal of Computer Science, 36(1), 10.

Qi, Q., Pei, Y., Modestino, J. W., & Tian, X. (2004). Source-adaptive FEC/UEP coding for video transport over bursty packet loss 3G UMTS networks: A cross-layer approach. In Proceedings of 60th IEEE Vehicular Technol-ogy Conference (VTC’04), (vol. 5, pp. 150-3154). IEEE.

Raghuraman, M. B. (2004). Design and implementation of V-HELP system–A voice-enabled web application for the visually impaired. (Unpublished Master Thesis). University of Nebraska, Lincoln, NE.

Rahman, S. D. & Fitzek. (2004). OFDM based WLAN systems. Technical Report R-04- 1002. Denmark: Aalborg University.

Rajagopalan & Shen. (2006). What does using TCP as an evaluation tool reveal about MANET routing protocols. In Proceeding of the 2006 International Conference on Wireless Communications and Mobile Computing. Newark, DE: University of Delaware.

Raju, Jitendranath, & Mungara. (2010). Performance evaluation of ZRP over AODV and DSR in mobile ad hoc networks using qualnet. European Journal of Scientific Research, 45, 658–674.

Ramirez, P., & Carta, J. A. (2006). The use of wind prob-ability distributions derived from the maximum entropy principle in the analysis of wind energy: A case study. Energy Conversion and Management, 47, 2564–2577. doi:10.1016/j.enconman.2005.10.027.

Rappaport, T. (1999). Wireless communications: Prin-ciples & practice. Upper Saddle River, NJ: Prentice Hall.

Rappaport, T. (2002). Wireless communication: Principles and practice. Upper Saddle River, NJ: Prentice Hall.

Ravi, K., Hussain, & Tirupathi. (n.d.). A new paradigm for the next generation wireless optimization cross layer design. International Journal Computer Technology Ap-plications, 2(3), 475-484.

Reiser, M. (1982). Performance evaluation of data com-munications systems. Proceedings of the IEEE, 70(2), 171–194. doi:10.1109/PROC.1982.12261.

Ribordy, G., Gautier, J.-D., Gisin, N., Guinnard, O., & Zbinden, H. (2000). Fast and user-friendly quantum key distribution. Journal of Modern Optics, 47, 517–531.

Richard, C. D. (2004). Magnetic levitation: A straightfor-ward and fast information guide to magnetic levitation. Retrieved from www.clearlyexplained.com

Richardson. (2003). IH264 and MPEG-4 video compres-sion: Video coding for next-generation. In Multimedia. Hoboken, NJ: John Wiley & Sons.

Riedi, R. H., Crouse, M. S., Ribeiro, V. J., & Baraniuk, R. G. (1999). A multifractal wavelet model with application to network traffic. IEEE Transactions on Information Theory, 45(3). doi:10.1109/18.761337.

Rodriguez, E. (2008). Robust error detection methods for H.264/AVC videos. (Master’s thesis). Universitat Politecnica de Catalunya, Vienna, Austria.

Rohling, M. Bruninghaus, & Grunheid. (1999). Broad-band OFDM radio transmission for multimedia applica-tions. Proceedings of the IEEE, 87(10), 1778–1789.

Romer, M. (2004). MPEG-4 video quality analysis. Ft. Lauderdale, FL: Florida Atlantic University.

Page 19: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

429

Rumyantsev, K. E. (2010). Quantum communication: Theory, experiments, applications. Info-Telecommunica-tion and Computer Technology, Equipment, and Systems in South Federal University. Rostov-on-Don, Russia: SFedU Publishers.

Sagias, N. C., Lazarakis, F. I., Tombras, G. S., & Datsikas, C. K. (2008). Outage analysis of decode and forward relay-ing over Nakagami-m fading channels. IEEE Signal Pro-cessing Letters, 15, 41–44. doi:10.1109/LSP.2007.910317.

Salatian, A. (2003). Interpreting historical ICU data using associational and temporal reasoning. In Proceedings of 15th IEEE International Conference on Tools with Arti-ficial Intelligence. Sacramento, CA: IEEE.

Salatian, A., & Taylor, B. (2004). An agglomerative ap-proach to creating models of building monitoring data. In Proceedings of 8th IASTED International Conference on Artificial Intelligence and Soft Computing. Marbella, Spain: IASTED.

Salatian, A., & Taylor, B. (2011). ABSTRACTOR: An expert system for fault detection in buildings. In Proceed-ings of 1st International Conference on Intelligent Systems & Data Processing. Vallabh Vidya Nagar, India: IEEE.

Salatian, A. (2010). A software architecture for decision support of building sensor data. International Journal of Smart Home, 4(4), 27–34.

Salatian, A., & Hunter, J. R. W. (1999). Deriving trends in historical and real-time continuously sampled medi-cal data. Journal of Intelligent Information Systems, 13, 47–74. doi:10.1023/A:1008706905683.

Salatian, A., & Oriogun, P. (2011b). A software architec-ture for summarising and interpreting ICU monitor data. International Journal of Software Engineering, 4(1), 3–14.

Salatian, A., & Taylor, B. (2008). ABSTRACTOR: An ag-glomerative approach to interpreting building monitoring data. Journal of Information Technology in Construction, 13, 193–211.

Salo, J., Vuokko, L., El-Sallabi, H. M., & Vainikainen, P. (2007). An additive model as a physical basis for shadow fading. IEEE Transactions on Vehicular Technology, 56(1), 13–26. doi:10.1109/TVT.2006.883797.

Saltzberg, B. (2000). Performance of an efficient paral-lel data transmission system. IEEE Signal Processing Magazine, 17.

Sani, D. S. (2004). Design and development of a magnetic levitation system. (Unpublished Master’s of Engineering Thesis). Bayero University, Kano, Nigeria.

Sanneck, H., Mohr, W., Le, L., & Hoene, C. (2002). Quality of service support for voice over IP over wireless. Wireless IP and Building the Mobile Internet.

Sarnoff Corporation. (2002). Jndmetrix-iq software and JND: A human vision system model for objective picture quality measurements. Sarnoff Corporation.

Sauro, J., & Kindlund, E. (2005). A method to standardize usability metrics into a single score. In Proceedings of CHI’05. Portland, OR: ACM.

Scarani, V. (2006). Quantum physics: A first encounter: Interference, entanglement, and reality. Oxford, UK: Oxford University Press.

Schulzrinne, H., Casner, S., Frederick, R., & Jacobson, V. (1996). RTP: A transport protocol for real-time ap-plications. RFC 1889.

Schulzrinne, H., Rao, A., & Lanphier, R. (1998). Real time streaming protocol (RTSP). RFC 2326.

Sesay, Yang, Qi, & He. (2004). Simulation comparison of four wireless ad hoc routing protocols. Information Technology Journal, 219-226.

Sesia, Toufik, & Baker. (2009). LTE-The UMTS long term evolution: From theory to practice. New York: Wiley & Sons, Ltd.

Seybold, J. (2005). Introduction to RF propagation. Hobo-ken, NJ: Wiley Interscience. doi:10.1002/0471743690.

Shakkottai, Rappaport, & Karlsson. (2003). Cross-layer design for wireless networks. IEEE Communications Magazine. doi:10.1109/MCOM.2003.1235598.

Shalizi, C. R. (2003). Optimal nonlinear prediction of random fields on networks. In Proceedings of Center for the Study of Complex Systems. University of Michigan.

Shannon, R. E. (1998). Introduction to the art and science of simulation. In Proceedings of the Simulation Confer-ence (Vol. 1, pp. 7-14). IEEE.

Page 20: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

433

Wang. (2010a). Dynamic load balancing in 3GPP LTE multi-cell networks with heterogeneous services. In Pro-ceedings of ICST Conference. Beijing, China: LNCIST.

Wang. (2010b). Dynamic load balancing and throughput optimization in 3GPP LTE networks (IWCMC 2010). Caen, France: IWCMC.

Wang, H., & Moayeri, N. (1995). Finite state Markov channel-A useful model for radio communication chan-nels. IEEE Transactions on Vehicular Technology, 44(2), 163–171. doi:10.1109/25.350282.

Wang, Y., Ostermann, J., & Zhang, Y.-Q. (2001). Video processing and communications. Upper Saddle River, NJ: Prentice Hall.

Warrier, Le, & Rhee (n.d.). Cross-layer optimization made practical. Raleigh, NC: Department of Computer Science, North Carolina State University.

Wenger, S. (2003). H264/AVC Over IP. IEEE Transac-tions on Circuits and Systems for Video Technology, 13(7), 645–656. doi:10.1109/TCSVT.2003.814966.

Wenger, S., Stockhammer, T., & Hannuksela, M. M. (2003). RTP payload format for H.264 video. Internet Draft.

Wiegand, T., Sullivan, G. J., Bjntegaard, G., & Luthra, A. (2003). Overview of the H.264/AVC video coding standard. IEEE Transactions on Circuits and Systems for Video Technology, 13(1), 560–576. doi:10.1109/TCSVT.2003.815165.

Williamson, K., Wright, S., Schauder, D., & Bow, A. (2001). The internet for the blind and visually impaired. Journal of Computer Mediated Communication. Retrieved from http://jcmc.indiana.edu/vol7/issue1/williamson.html

Windump.polito.it. (n.d.). Retrieved from http://www.windump.polito.it

WireShark Software. (n.d.). Retrieved from http://www.wireshark.org

Wolf, S., & Pinson, M. (1999). Spatial-temporal distortion metrics for in-service quality monitoring of any digital video system. In Proceedings of SPIE International Symposium on Voice, Video, and Data Communications. Boston: SPIE.

Wolf, S., & Pinson, M. (2002). Video quality measure-ment techniques. Technical Report 02 392. Washington, DC: US Department of Commerce, NTIA.

Wolfram Functions Site. (2011). Retrieved from http://functions.wolfram.com/GammaBetaErf/Gamma2

Wong, E. (1978). Recursive causal linear filtering for two-dimensional random fields. IEEE Transac-tions on Information Theory, 24, 50–59. doi:10.1109/TIT.1978.1055818.

Wong, T. (1986). Design of a magnetic levitation sys-tem. IEEE Transactions on Education, 29, 196–200. doi:10.1109/TE.1986.5570565.

Woods, J. W. (1972). Two-dimensional discrete Markov fields. Information Theory, 22, 232–240. doi:10.1109/TIT.1972.1054786.

Wornell, G. (1996). Signal processing with fractals: A wavelet-based approach. London, UK: Prentice-Hall International.

Wu, D., Hou, Y. T., Zhu, W., Lee, H.-J., Chiang, T., Zhang, Y.-Q., & Chao, H. J. (2000). On end-to-end architecture for transporting MPEG-4 video over the internet. IEEE Transactions on Circuits and Systems for Video Technol-ogy, 10(6), 923–941. doi:10.1109/76.867930.

Xylomenos, G. C., & Polyzos. (n.d.). Internet protocol performance over networks with wireless links. IEEE Network, 13(4), 55–63.

Yang, G., Du, Y., & Chen, M. (2008). Computer aided investigation towards the wind power generation poten-tials of Guangzhou. Computer and Information Science, 1(3), 13–19.

Yang, T. (2004). A survey of chaotic secure communi-cation systems. International Journal of Computational Cognition, 2(2), 81–130.

Yang, Z., Miyazaki, K., Kanae, S., & Wada, K. (2004). Robust position control of a magnetic levitation system via dynamic surface control technique. IEEE Transactions on Industrial Electronics, 51(1), 26–34. doi:10.1109/TIE.2003.822095.

Yarlykov. (1980). Application of Markovian theory of non-linear filtering in radio engineering. Moscow: Sovetskoe Radio Publishing.

Page 21: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

432

Trubin, I. S., & Butorin, E. L. (2004). Mathematical model of the digital image sequence. In Proceedings of Russian NTO Popov Society: Digital Processing of Signals and its Application (Vol. 2, pp. 166–169). Moscow: NTO.

Trulove, J. (2000). Broadband networking. Boca Raton, FL: CRC Press.

Tse, D., & Viswanath, P. (2005). Fundamentals of wireless communication. Cambridge, UK: Cambridge University Press. doi:10.1017/CBO9780511807213.

Turner, R., Sripada, S., Reiter, E., & Davy, I. (2008). Us-ing spatial reference frames to generate grounded textual summaries of georeferenced data. In Proceedings of 5th International Natural Language Generation Conference. Salt Fork, OH: IEEE.

Tzes, A., Chen, J. C., & Peng, P. Y. (1994). Supervisory fuzzy control design for a magnetic suspension system. In Proceedings of the 30th IEEE Conference on Fuzzy Systems, (vol. 1, pp. 138-143). IEEE Press.

Van Nee, R. (2002). New high-rate wireless LAN stan-dards. IEEE Communications Magazine, 40.

Vasiliev, K. K. (1995). Applied theory of random processes and fields. Ulyanovsk, Russia: UlGTU Publishing.

Vasiliev, K. K. (2002). Representation and fast processing of multi-dimensional images. New Scientific Technolo-gies, (3), 4-24.

Vasiliev, K. K. (1995). Digital processing of image sequences in global monitoring problems of the Earth surface, the medicine, the air motion control, radar systems and hydro-location. In Conversion of Military Complex, Double-Application Technologies. Moscow: RIA Publishing.

Vasiukov, V.N. (2002). New approaches to solution of the image recognition and processing. New Scientific Technologies, (3), 44-51.

VCDemo Software. (n.d.). Retrieved from http://www.ict.ewi.tudelft.nl/vcdemo

Vehel & Sikdar. (2001). A multiplicative multifractal model for TCP traffic. In Proceedings of IEEE ISCC‘01. IEEE. Retrieved from http://citeseer.ist.psu.edu/ve-hel01multiplicative.html

Velten, K. (2009). Mathematical modeling and simula-tion: Introduction for scientists and engineers. Weinheim: Wiley-VCH Verlag GmbH..

Venkataraman, P. (2009). Applied optimisation with MAT-LAB programming. New Jersey: John Wiley & Sons, Inc..

Vinkler, G. (2002). Image analysis, random fields, and dynamic methods of Monte-Carlo. In Mathematical Fundamentals. Novosibirsk, Russia: Siberian Division of RAS Publishing.

VirtualDub Software. (n.d.). Retrieved from http://www.virtualdub.org

Vishnevsky, V. M. (2003). Theoretical bases of computer network design. Moscow: Technosphere Publishing.

Viswanath, P., Tse, D. N. C., & Laroia, R. L. (2002). Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory, 48, 1277–1294. doi:10.1109/TIT.2002.1003822.

Viterbi, A. (1995). CDMA: Principles of spread spectrum communication. Boston: Addison Wesley Longman, Inc..

Voice, X. M. L. (2007). VoiceXML application develop-ment life cycle. Palo Alto, CA: Hewlett Packard Devel-opment Company. Retrieved from staff.washington.edu/benroy/ivr/vx_devlifecycle.pdf

Voxeo. (2003). Voice voice server. Retrieved from http://community.voxeo.com

Walker, E., Zepernick, H. J., & Wysocki, T. (1998). Fading measurements at 2.4 GHz for the indoor radio propagation channel. Paper presented at the International Zurich Seminar on Broadband Communications. Zurich, Switzerland.

Walsh, P., & Meade, J. (2003). Speech enabled e-learning for adult literacy tutoring. In Proceedings of the 3rd IEEE International Conference on Advanced Learning Tech-nologies (ICALT’03). IEEE. Retrieved from http://i-learn.uitm.edu.my/resources/journal/j1.pdf

Wang. (2005). Neuro-fuzzy modeling for microarray cancer gene expression data. First Year Transfer Report. Oxford, UK: Linacre College, Oxford University, Com-puting Laboratory.

Page 22: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

431

Stevens, W.R. (1997). TCP slow start, congestion avoid-ance, fast retransmit, and fast recovery algorithms. RFC 2001.

Stevens, W. R. (1998). The protocols (Vol. 1). TCP/IP Illustrated.

Stratonovich, R. L. (1959). Optimal nonlinear systems providing the extraction of the signal with constant parameters from noise. Radiophysics, 11(6), 892–901.

Stratonovich, R. L. (1960). Application of the Markovian process theory for signal optimal filtering. Radio Engi-neering and Electronics, 11, 1751–1763.

Stucki, D., Gisin, N., Guinnard, O., Ribordy, G., & Zbinden, H. (2002). Quantum key distribution over 67 km with a plug&play system. New Journal of Physics, 4, 41.1– 41.8.

Stuhlmuller, K., Farber, N., Link, M., & Girod, B. (2000). Analysis of video transmission over lossy channels. IEEE Journal on Selected Areas in Communications, 18(6), 1012–1032. doi:10.1109/49.848253.

Sulaiman, M. Y., Akaak, A. M., Wahab, M., Zakaria, A., & Suradi, J. (2002). Wind characteristics of Oman. Energy, 27, 35–46. doi:10.1016/S0360-5442(01)00055-X.

Sun, J.-T., Shen, D., Zeng, H.-J., Yang, Q., Lu, Y., & Chen, Z. (2005). Web-page summarization using clickthrough data. In Proceedings of 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM.

Sven, U., Ales, F., & Stanislav, H. (2008). Quantification of traffic burstiness with MAPI middleware. In Proceed-ings 2008 CESNET (Czech Educational and Scientific Network) Conference, (pp. 13-22). Prague, Czech Re-public: CESNET.

Takagi & Sugeno. (1985). Fuzzy identification of systems and its application to modelling and control. IEEE Trans-actions on Systems, Man, and Cybernetics, 15, 116–132.

Tanenbaum, A. (2003). Computer networks. Upper Saddle River, NJ: Prentice Hall.

Tar, K. (2007). Some statistical characteristics of monthly average wind speed at various heights. Renew-able & Sustainable Energy Reviews, 12(6), 1712–1724. doi:10.1016/j.rser.2007.01.014.

Tedeschi, L. O. (2006). Assessment of the adequacy of mathematical models. Agricultural Systems, 89(2), 225–247. doi:10.1016/j.agsy.2005.11.004.

Telatar, I. (1999). Capacity of multi-antenna gaussian channels, 10(6), 585-595.

TellMe Voice Portal. (2002). Retrieved from http://www.tellme.com

The Network Simulator. (n.d.). NS-2. Retrieved from http://www.isi.edu/nsnam/ns/ns-build.html#allinone

Tikhonov, V. I. (1966). Statistic radio engineering. Mos-cow: Sovetskoe Radio Publishing.

Tikhonov, V. I. (1970). Nonlinear optimal filtering and the quasi-coherent signal reception. Radioelectronics, 13(2), 152–169.

Tikhonov, V. I., & Mironov, M. A. (1977). Markov pro-cesses. Moscow: Sovetskoe Radio Publishing.

Tomashevsky, A. I., & Kapranov, M. V. (2006). Fractal properties of chaotic dynamic processes in reverse time. Nonlinear World, (4-5), 214–237.

Torab, P., & Kanem, E. (1999). Load analysis of packet switched networks in control systems. In Proceedings 25th Annual Conference of the IEEE Industrial Electronics Society, (pp. 1222-1227). San Jose, CA: IEEE.

Triantafyllidou & Al Agha. (2007). Evaluation of TCP performance in MANETs using an optimized scalable simulation model. Paper presented at International Confer-ence of Modeling, Analysis, and Simulation of Computer and Telecommunication Systems. Istanbul, Turkey.

Trubin, I. S., & Butorin, E. L. (2005). Spatial-time Markov model of digital half-tone images. Radio Engineering, (10), 10-13.

Trubin, I. S. (2004). Mathematical model of two statisti-cally correlated video-sequences.[). St. Petersburg, Russia: SP Technical University Publishing.]. Proceedings of Universities in Communications, 171, 90–97.

Trubin, I. S. (2004). Methods of digital signal process-ing. Vyatka, Russia: Vyatka State University Publishing.

Page 23: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

430

Shannon, C. E. (1948). A mathematical theory of com-munication. The Bell System Technical Journal, 27, 379–423, 623–656.

Shata, A. S. A., & Hanitsch, R. (2006). Evaluation of wind energy potential and electricity generation on the coast of Mediterranean Sea in Egypt. Renewable Energy, 31, 1183–1202. doi:10.1016/j.renene.2005.06.015.

Shaw, M., & Garlan, D. (1996). Software architecture: Perspectives on an emerging discipline. Englewood Cliffs, NJ: Prentice Hall.

Sheluhin, O. I., & Atayero, A. A. (2012). Detection of DoS and DDoS attacks in information communication networks with discrete wavelet analysis. International Journal of Computer Science and Information Scurity, 10(1), 53–57.

Sheluhin, O. I., Atayero, A. A., & Garmashev, A. V. (2011). Detection of teletraffic anomalies using multi-fractal analysis. International Journal of Advancements in Computing Technology, 3(4), 174–182. doi:10.4156/ijact.vol3.issue4.19.

Sheluhin, O. I., Smolskiy, S. M., & Osin, A. V. (2007). Self-similar processes in telecommunications. New York: John Wiley & Sons. doi:10.1002/9780470062098.

Shen, J. (2002). H∞ control and sliding mode control of magnetic levitation system. Asian Journal of Control, 4(3), 333–340. doi:10.1111/j.1934-6093.2002.tb00361.x.

Shor, P. W., & Preskill, J. (2000). Simple proof of security of the BB84 quantum key distribution protocol. Physical Review Letters, 85, 441–444. doi:10.1103/PhysRev-Lett.85.441 PMID:10991303.

Simon, M. K., & Alouini, M. S. (2005). Digital com-munication over fading channels. New York: John Wiley & Sons.

Simulink™. (2000). Design and simulate continuous and discrete time systems. Retrieved from http://www.mathworks.com/products/Simulink™

Singh, S. (2000). The code book: The secret history of codes and code breaking. London, UK: Forth Estate.

Smart, N. (2004). Cryptography: An introduction. New York: McGraw-Hill College.

Soifer, V. A. (2003). Methods of computer image process-ing. Moscow: FIZMATLIT Publishing.

Song, Y. (2001). Time constrained communication over switched ethernet. In Proceedings IFAC International Conference on Fieldbus Systems and their Application, (pp. 152-169). Nancy, France: IFAC.

Song, G. (2005). Cross-layer resource allocation and scheduling in wireless multicarrier networks. Atlanta, GA: Georgia Institute of Technology.

Soon-Duck, K. (2010). Uncertainty analysis of wind energy potential assessment. Journal of Applied Energy, 87, 856–865. doi:10.1016/j.apenergy.2009.08.038.

Spasic, I., Ananiadou, S., & Tsujii, J. (2005). MaSTerClass: A case-based reasoning system for the classification of biomedical terms. Retrieved http://qr.net/jzsU, accessed 2005.07.05

Spector, A. A. (1985). Multi-dimensional discrete Markov fields and its filtering at the presence of the non-correlated noise. Radio Engineering and Electronics, (5): 512–523.

Spector, A. A. (1987). Two-stage filtering of random fields at interference presence. In Methods of Processing of Digital Signals and Fields under Condition of Interfer-ence. Novosibirsk, Russia: IEEE Publishing.

Speigel, M. R., Lipschutz, S., & Liu, J. (2009). Math-ematical handbook of formulas and tables. New York: McGraw Hill.

Square D® ethernet switch model SDM 5DE 100 installa-tion and illustration bulletin . (n.d.). Retrieved February 03, 2009 from www.us.squareD

Sripada, S., Reiter, E., & Davy, I. (2003). SumTime-mousam: Configurable marine weather forecast generator. Expert Update, 6(3), 4–10.

Srivastava, V., & Motani, M. (2005, December). Cross-layer design: A survey and the road ahead. IEEE Commu-nications Magazine. doi:10.1109/MCOM.2005.1561928.

Sterman, J. D. (2000). Business dynamics – Systems thinking and modeling for a complex world. New York: Irwin McGraw-Hill.

Page 24: Compilation of ReferencesCompilation of References 413 Atayero, A. A., Sheluhin, O. I., & Ivanov, Y. A. (2013). Modeling, simulation and analysis of video streaming errors in wireless

Compilation of References

434

Yindi, J., & Jafarkhani, H. (2009). Single and multiple relay selection schemes and their achievable diversity orders. IEEE Transactions on Wireless Communications, 8(3), 1414–1423. doi:10.1109/TWC.2008.080109.

Zaiane, O. R. (2005). Recommended systems for e-learning: Towards non-intrusive web mining. Data Mining in E-Learning, 2.

Zaykovskiy, D. (2006). Survey of the speech recognition techniques for mobile devices. In Proceedings of Speech and Computer (SPECOM’06). St. Petersburg, Russia: SPECOM.

Zhang, Liu, Zhang, Jia, & Duan. (2011). A two-layer mobility load balancing in LTE self-organization net-works. In Proceedings of IEEE Internal Conference on Communication Technology. Beijing: IEEE Press.

Zhou, N. (2008). Novel batch dependant cross-layer scheduling for multiuser OFDM systems. Washington, DC: IEEE Press. doi:10.1109/ICC.2008.728.

Zyren & McCoy. (2007). Overview of the 3GPP long term evolution physical layer. (White Paper) Document number:3GPPEVOLUTIONWP Rev. 0: Freescale semi-conductor.